Don’t let cybercriminals score. Beat their game-plan. Cybercriminals typically take advantage of the huge public interest in major international events. The FIFA World Cup 2018 that begins shortly in Russia is no exception and cybercriminals have been busy exploiting the excitement about the world’s biggest sporting event. The numbers are staggering. FIFA estimated that 715.1…

Danger: VPNFilter Malware: What is it and how is network-based security best placed to thwart it? What’s this latest threat? A new malware threat has emerged that poses such a serious potential threat to data security that the FBI has advised all router users to reboot their devices. The malware, called VPNFilter, can spy…

The past twelve months has been a turbulent year for many, not least with its fair share of extreme weather and economic crises. However it’s not all been doom and gloom. Google’s 2017 Year in Search revealed the most popular type of question asked to its search engine was “how” – evidencing people’s yearning to…

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

While this may sound like the old joke about the three “L’s” of real estate success — location, location, location — it’s actually deadly serious. When it comes to IoT (Internet of Things), CSPs should pay particular attention to the 3 S’s: Security, Security, Security. Unless internalized, there could be some real heartache coming to…

The promise of connected things has finally started to make itself felt. Carriers are busy launching their IoT offerings preparing for the massive burst of growth as the adoption of connected devices begins to outstrip that of mobile handsets. From fleet tracking telemetry to home alert systems, the use cases have been endless and many…

Just as the Petya ransomware scheme was discovered and we managed to tackle it, we now face a new challenge to mobile security: CopyCat malware. How does it work? CopyCat generates and steals ad revenues. It’s disguised as popular apps and it infects each device once downloaded by collecting data about the infected device and…

Ransomware-as-a-service has been identified as the next great cyber threat, and the stats indicate we’re already living the nightmare. Forbes reports that the growth is enormous, with “attacks [multiplying] 167 times over, from 4 million in 2015 to 638 million in 2016.” Dubbed GoldenEye by many, the latest strain of the Petya malware may be…

In the 21st century, cybercrime is rampant with hackers stealing and using data from individuals, companies and governments for their personal, financial or political gain. In particular, government agencies and large corporations are prime targets for organized hacker groups (“hacktivists”) such as Anonymous.

With the growth of enterprise mobility and cloud migration, enterprises and SMBs are facing complex security issues. Despite being quite effective in warding off known threats, it’s the tide of unknown and backdoor threats that put organizations under pressure. We at Allot have just published a thought-provoking report, based on real data of malicious traffic…

Keeping you up to date

Be the first to know about the latest updates and trends in network security and IoT.